O'Reilly logo

Developing Cybersecurity Programs and Policies, Third Edition by Sari Greene, Omar Santos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Information Systems Acquisition, Development, and Maintenance

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Understand the rationale for the systems development life cycle (SDLC).

  • Recognize the stages of software releases.

  • Appreciate the importance of developing secure code.

  • Be aware of the most common application development security faults.

  • Explain cryptographic components.

  • Develop policies related to systems acquisition, development, and maintenance.

Section 14 of ISO 27002:2013: “Information Systems Acquisition, Development, and Maintenance (ISADM)” focuses on the security requirements of information systems, application, and code from conception to destruction. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required